CN107835167A - A kind of method of data protection, terminal and computer-readable recording medium - Google Patents

A kind of method of data protection, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107835167A
CN107835167A CN201711046626.6A CN201711046626A CN107835167A CN 107835167 A CN107835167 A CN 107835167A CN 201711046626 A CN201711046626 A CN 201711046626A CN 107835167 A CN107835167 A CN 107835167A
Authority
CN
China
Prior art keywords
packet
data
node
trusted
peer node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711046626.6A
Other languages
Chinese (zh)
Inventor
张庆治
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201711046626.6A priority Critical patent/CN107835167A/en
Publication of CN107835167A publication Critical patent/CN107835167A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of method of data protection, terminal and computer-readable recording medium, wherein this method includes:Receive the packet that peer node is sent;It is non-trusted node to determine peer node;When packet includes request message, response message corresponding to packet is determined, request message is used for acquisition request feedback data;Feedback data in response message corresponding to packet is replaced with into the first preset data, the response message after being replaced;Response message after replacement is sent to peer node;When packet does not include request message, packet discard, or the data division in packet is replaced with into the second preset data and is stored the packet after replacement;Generate response;Response is sent to peer node, response is used to indicate that packet normally receives.In this way, improving the protective capacities to non-trusted website, strengthen data protection dynamics.

Description

A kind of method of data protection, terminal and computer-readable recording medium
Technical field
The present invention relates to internet security technology, more particularly to a kind of method of data protection, terminal and computer-readable Storage medium.
Background technology
Firewall technology be one combined by software and hardware equipment, internally between net and extranets, private network The protective barrier constructed on interface between public network, it is a kind of vivid saying for obtaining security method menu, it is a kind of meter The combination of calculation machine hardware and software, make to set up a security gateway between network, so as to protect in-house network from disabled user Intrusion, fire wall is mainly made up of 4 service access rule, verification tool, packet filtering and application gateway parts, and fire wall is just It is the software or hardware between computer and network that it is connected, the all-network communication of computer inflow and outflow It is intended to packet by this fire wall.Fire wall can effectively filter out the data that non-trusted website issues, but not be The data that all non-trusted websites issue can be filtered.Therefore, when non-trusted website will likely be taken under viruliferous data When being sent to terminal, terminal receive take viruliferous data when, the normal operation of terminal may be influenceed;When non-trusted website During the data of acquisition request terminal, significant data can be uploaded to non-trusted website by terminal, cause end message to be revealed;In addition, If terminal is rejected, non-trusted website continuously can send data to terminal, same to influence terminal normal work.
The content of the invention
In order to solve the above technical problems, offer of the embodiment of the present invention a kind of method of data protection, terminal and computer can Storage medium is read, improves the protective capacities to non-trusted website, strengthens data protection dynamics.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of method of data protection, including:
Receive the packet that peer node is sent;
It is non-trusted node to determine the peer node;
When the packet includes request message, response message corresponding to the packet, the request message are determined For acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first present count According to the response message after being replaced;Response message after the replacement is sent to the peer node;
When the packet does not include request message, the packet is abandoned, or by the data in the packet Partial replacement is the second preset data, and the packet after replacement is stored;Generate response;The response is sent out The peer node is delivered to, the response is used to indicate that the packet normally receives.
In such scheme, the response message after the replacement is used to indicate that the peer node stops continuing to send the number According to bag.
In such scheme, first preset data is:Encryption data, mess code data, full 0 data or complete 1 data;It is described Encryption data is:The data obtained after the feedback data is encrypted using default AES;Described second is default Data are:Mess code data, full 0 data or complete 1 data.
In such scheme, after the packet that the reception peer node is sent, methods described also includes:
The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set is included at least The identification information of one non-trusted node;
When the identification information of the peer node is an identification information in non-trusted node set, it is described right to determine End node is non-trusted node.
In such scheme, the identification information of the non-trusted node is including at least one of following:IP address, domain name.
A kind of terminal is additionally provided in the embodiment of the present invention, it is characterised in that the terminal includes:Processor and storage Device;Wherein,
The processor is used to perform the data protection program stored in memory, to realize following steps:Receive opposite end The packet that node is sent;
It is non-trusted node to determine the peer node;
When the packet includes request message, response message corresponding to the packet, the request message are determined For acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first present count According to the response message after being replaced;Response message after the replacement is sent to the peer node;
When the packet does not include request message, the packet is abandoned, or by the data in the packet Partial replacement is the second preset data, and the packet after replacement is stored;Response is generated, the response is sent out The peer node is delivered to, the response is used to indicate that the packet normally receives.
In such scheme, the response message after the replacement is used to indicate that the peer node stops continuing to send the number According to bag.
In such scheme, after the packet that the reception peer node is sent, the processor is specifically used for realizing Following steps:
The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set is included at least The identification information of one non-trusted node;
When the identification information of the peer node is an identification information in non-trusted node set, it is described right to determine End node is non-trusted node.
In such scheme, the identification information of the non-trusted node is including at least one of following:IP address, domain name.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, when the computer program is executed by processor The step of realizing the method described in any of the above-described.
Method, terminal and the computer-readable recording medium of a kind of data protection provided in an embodiment of the present invention, reception pair The packet that end node is sent;It is non-trusted node to determine the peer node;When the packet includes request message, really Response message corresponding to the fixed packet, the request message are used for acquisition request feedback data;The packet is corresponding Response message in feedback data replace with the first preset data, the response message after being replaced;After the replacement Response message is sent to the peer node;When the packet does not include request message, the packet is abandoned, or will Data division in the packet replaces with the second preset data, and the packet after replacement is stored;Response is generated to ring Should;The response is sent to the peer node, the response is used to indicate that the packet normally receives.
Using above-mentioned technical proposal, when it is determined that the peer node for sending packet is non-trusted node, by non-trusted section After the feedback data of point request replaces with the first preset data, sending to peer node;Or the number for sending peer node Directly abandon, and returned for indicating the response that normally receives according to bag, that is, avoid non-trusted node data steal with The threat data of non-trusted node is received, non-trusted node is it also avoid and continuously transmits packet.In this way, improve to non-trusted net The protective capacities stood, strengthen data protection dynamics.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing each optional mobile terminal of embodiment one of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the flow chart of the first embodiment of the method for data protection in the embodiment of the present invention;
Fig. 4 is the flow chart of the second embodiment of the method for data protection in the embodiment of the present invention;
Fig. 5 is the flow chart of the 3rd embodiment of the method for data protection in the embodiment of the present invention;
Fig. 6 is the flow chart of the fourth embodiment of the method for data protection in the embodiment of the present invention;
Fig. 7 is the flow chart of the 5th embodiment of the method for data protection in the embodiment of the present invention;
Fig. 8 is the composition structural representation of terminal in the embodiment of the present invention.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc. The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
First embodiment
First embodiment of the invention proposes a kind of method of data protection, and this method can apply to data protection In the terminal of function.
Here, the terminal of above-mentioned record can be the fixed terminal with display screen or the shifting with display screen Dynamic terminal.
The fixed terminal of above-mentioned record can be computer etc., and the mobile terminal of above-mentioned record includes but is not limited to mobile electricity Words, notebook computer, camera, PDA, PAD, PMP, guider etc..The terminal can be connected to internet, wherein, institute The mode for stating connection can be that the mobile internet provided by operator is attached, and can also be and wirelessly connect by access Access point carries out network connection.
Here, if mobile terminal has operating system, the operating system can be UNIX, Linux, Windows, Android (Android), Windows Phone etc..
It should be noted that species, shape, size to the display screen in terminal etc. is not limited, it is exemplary, eventually Display screen on end can be LCDs etc..
In the first embodiment of the invention, the display screen of above-mentioned record is used for the interface for providing a user man-machine interaction.
Fig. 3 is the flow chart of the first embodiment of the method for data protection in the embodiment of the present invention, as shown in figure 3, the party Method includes:
Step 301:Receive the packet that peer node is sent.
In the embodiment of the present invention, peer node can be able to be specifically with any one network node in computer network Work station, client, the network user or personal computer, can also be server, printer and other can be set with network connection It is standby.Each Gong Zuo Zhan ﹑ servers, terminal device, network equipment, that is, the equipment for possessing oneself unique network address is all network Node.Whole network is made up of this various network node, each network in computer network topologies It can be connected between node by communication line, form certain geometrical relationship, realize the communication between network node.
In actual applications, network node can be divided into trust network node and non-trusted network node, trust network section The security of point is higher, and the data for issuing or asking are generally secure data, and what user terminal can trust enters line number therewith According to interaction;Rather than trusted node is generally in network activity and is possible to dangerous node, such node to user terminal Threat data is issued, such as:Carry the data of trojan horse;Or user terminal private data is stolen, such as:Privacy information, business Secret, scientific achievement etc..
Step 302:It is non-trusted node to determine peer node.
When actually implementing, can also include before this step:Obtain the identification information of peer node and non-trusted node Set, non-trusted node set include the identification information of at least one non-trusted node;When the identification information of peer node is non- During an identification information in trusted node set, it is non-trusted node to determine peer node.Exemplary, non-trusted node Identification information includes at least one of following:IP address, domain name.
Another optional embodiment is that non-trusted node set includes at least one non-trusted node type, wherein, A kind of a kind of corresponding protection rule of non-trusted node type.Terminal it is determined that peer node be non-trusted node after, further really Recognize the non-trusted node type of peer node, and protection rule, the protection of peer node is completed using the protection rule of determination Operation.
When actually implementing, the method for building up of non-trusted node set can include:Using network security technology determine to A few non-trusted node;Non-trusted node set is established using the identification information of all non-trusted nodes of determination;It is non-trusted The identification information of node can be the domain name or IP address of non-trusted node.
Specifically, the domain name or IP address of peer node are obtained, when the domain name of peer node is in non-trusted node set A domain name, or peer node IP address be non-trusted node set in an IP address when, determine peer node For non-trusted node.
Step 303:When packet includes request message, response message corresponding to packet is determined, request message is used for Acquisition request feedback data;Feedback data in response message corresponding to packet is replaced with into the first preset data, replaced Response message after changing;Response message after replacement is sent to peer node.
Exemplary, when fire wall can not stop when data request information is transmitted to terminal of non-trusted node, terminal When receiving the request message that non-trusted node is sent, can be determined according to normal request responding process comprising feedback data Response message, using the response message comprising feedback data as the first response message;Response message is being sent to non-trusted node Before, the feedback data in the first response message is replaced with into the first preset data, obtains the second response message, terminal finally will Second response message is sent to peer node.
Exemplary, the first preset data is:Encryption data, mess code data, full 0 data or complete 1 data, encryption data For:The data obtained after feedback data is encrypted using default AES.It is understood that the first response message In the feedback data that includes be valid data, the first preset data included in the second response message obtained after replacement is Invalid data.Non-trusted node will be considered that when receiving the second response message of terminal transmission has normally stolen number of terminals According to the request of data to the terminal will be stopped.
Exemplary, default AES can be:IDEA(International Data Encryption Algorithm, Chinese IDEA), DES (Data Encryption Standard, Chinese data Encryption standard), MD5 (Message-Digest Algorithm 5, Chinese Message-Digest Algorithm 5) etc..
It should be noted that when non-trusted node detects to the response message received, because encryption data does not have There is any detection foundation, therefore be easier to believe non-trusted server successfully to steal terminal data, and stop to the end The request of data at end.
In the embodiment of the present invention, the response message after replacement is used to indicate that peer node stops continuing to send packet.
Step 304:When packet does not include request message, packet discard, or by the data division in packet The second preset data is replaced with, the packet after replacement is stored;Generate response;Response is sent to opposite end Node, response are used to indicate that packet normally receives.
In the embodiment of the present invention, packet does not refer to that the packet issues for non-trusted node to terminal including request message Data, rather than data for acquisition request terminal.Packet includes:Head and data division, wherein, data division can Can take viruliferous threat data, terminal receives and may threaten terminal security after data storage bag.
Exemplary, when fire wall can not stop the packet issued of non-trusted node, terminal is receiving non-letter During the packet for appointing node to send, directly by data packet discarding;Or the data division in packet is replaced with second and preset Data, the packet after replacement is stored.Exemplary, the second preset data is:Mess code data, full 0 data or complete 1 number According to.
Generate response;Response is sent to peer node;The response is used to indicate the packet just Often receive.
In the embodiment of the present invention, response is sent to peer node, to inform data that peer node this time issues Bag has been received normally, and avoids peer node from persistently issuing packet.
When actually implementing, the packet after storage is replaced can also include afterwards:It will be replaced after default time interval Packet after changing is deleted.When actually implementing, if terminal directly can be by non-trusted node by the operation of data packet discarding Detect, and carry out packet and resend;In order to avoid such case occurs, first the data content in packet can be replaced The first preset data is changed to, then the packet after replacement is stored.Here the packet after replacing eliminates threat data, The storage of terminal will not threaten the safety of terminal.
Using above-mentioned technical proposal, when it is determined that the peer node for sending packet is non-trusted node, by non-trusted section After the feedback data of point request replaces with the first preset data, sending to peer node;Or the number for sending peer node Directly abandon, and returned for indicating the response that normally receives according to bag, that is, avoid non-trusted node data steal with The threat data of non-trusted node is received, non-trusted node is it also avoid and continuously transmits packet.In this way, improve to non-trusted net The protective capacities stood, strengthen data protection dynamics.
In order to more embody the purpose of the present invention, on the basis of first embodiment of the invention, such scheme is carried out It is further to illustrate.
Second embodiment
Fig. 4 is the flow chart of the second embodiment of the method for data protection in the embodiment of the present invention, as shown in figure 4, the stream Journey includes:
Step 401:Receive the data request information that peer node is sent.
In the embodiment of the present invention, peer node can also be base station, and mobile terminal receives the request of data that base station is sent and disappeared Breath.The request message can be used for acquisition request mobile terminal data, such as:Address list, privacy of user, the data of application program Deng.
Step 402:Obtain the identification information of peer node.
Step 403:Whether the identification information for judging peer node is identification information in non-trusted node set;If It is to perform step 404;If not, perform step 407.
Step 404:It is non-trusted node to determine peer node, and determines response message corresponding to request message.
Step 405:Feedback data in response message is replaced with into the first preset data, the response after being replaced disappears Breath.
Exemplary, response message includes corresponding to request message:Statusline, message header, physical contents, wherein, entity Content is the feedback data of terminal.Physical contents are replaced with into the response message after being replaced after the first preset data.
Another optional embodiment is that non-trusted node set includes at least one non-trusted node type, wherein, A kind of a kind of corresponding protection rule of non-trusted node type.Terminal it is determined that peer node be non-trusted node after, further really Recognize the non-trusted node type of peer node, and protection rule, the protection of peer node is completed using the protection rule of determination Operation.Exemplary, different corresponding the first different preset data of protection rule, for example, the non-trusted node of the first kind is corresponding Protection rule be:Feedback data is replaced with into encryption data, protection rule is corresponding to the non-trusted node of the second class:Will feedback Data replace with mess code data, and protection rule is corresponding to the 3rd non-trusted node of class:Feedback data is replaced with into full 0 data, Protection rule is corresponding to the 4th non-trusted node of class:Feedback data is replaced with into complete 1 data.
Step 406:Response message after replacement is sent to peer node.
When actually implementing, physical contents of the peer node in message is read after receiving response message, confirm to complete This request of data flow, stop sending data request information to terminal.
Step 407:It is trusted node to determine peer node, and determines response message corresponding to request message.
Step 408:Response message corresponding to request message is sent to peer node.
Here, after it is determined that peer node is trusted node, i.e., peer node be security node, performs normal request sound Flow is answered, that is, performs step 407 and step 408.
In order to more embody the purpose of the present invention, further illustrated on the basis of first embodiment of the invention Explanation.
3rd embodiment
Fig. 5 is the flow chart of the 3rd embodiment of the method for data protection in the embodiment of the present invention, as shown in figure 5, the stream Journey includes:
Step 501:Receive the packet that peer node is sent.
Here, packet is the data that peer node issues to terminal, and terminal only needs to receive, it is not necessary to on peer node Pass its data.
Step 502:Obtain the identification information of peer node.
Step 503:Whether the identification information for judging peer node is identification information in non-trusted node set;If It is to perform step 504;If not, perform step 506.
Step 504:It is non-trusted node to determine peer node, and packet discard simultaneously generates " confirming to receive " response.
When actually implementing, when peer node is non-trusted node, the packet that terminal receives may carry virus, because This is needed data packet discarding.
When actually implementing, non-trusted node set is established by existing Network Security Device.Network Security Device Also non-trusted node can be classified, Network Security Device is implemented different protection to different types of non-trusted node and advised Then.For example, the first non-trusted node correspondingly protects regular A, second of non-trusted node correspondingly protects regular B.Therefore, terminal When it is determined that peer node is non-trusted node, the non-trusted node type of peer node can also be further determined that, according to non- Trusted node type protects rule corresponding to determining.
Step 505:" it will confirm to receive " response to send to peer node.
Step 506:Received data packet.
Here, received data packet concrete implementation mode is terminal data method of reseptance of the prior art, here no longer Repeat.
In order to more embody the purpose of the present invention, further illustrated on the basis of first embodiment of the invention Explanation.
Fourth embodiment
Fig. 6 is the flow chart of the fourth embodiment of the method for data protection in the embodiment of the present invention, as shown in fig. 6, the stream Journey includes:
Step 601:Receive the packet that peer node is sent.
Step 602:Obtain the identification information of peer node.
Step 603:Whether the identification information for judging peer node is identification information in non-trusted node set;If It is to perform step 604;If not, perform step 607.
Step 604:Data division in packet is replaced with into the second preset data, the packet after replacement is deposited Storage, and generate " confirming to receive " response.
When actually implementing, for terminal after packet is received, non-trusted node may be within a certain period of time to terminal It is monitored, when non-trusted nodal test is to terminal not received data bag, can be resend.In order to avoid this feelings Data division in packet first can be replaced with the second preset data and be stored again, so reached " deception " by condition, terminal Purpose.
Specifically, the packet received includes:Head and data division, retain header contents, data division is replaced To be stored after full 0 data.
Step 605:" it will confirm to receive " response to send to peer node.
Step 606:The packet after replacement is deleted after default time interval.
In this step, determine this packet to issue when operation is completed in non-trusted node and delete the packet of storage.
Step 607:Received data packet.
In order to more embody the purpose of the present invention, further illustrated on the basis of first embodiment of the invention Explanation.
5th embodiment
Fig. 7 is the flow chart of the 5th embodiment of the method for data protection in the embodiment of the present invention, in the embodiment of the present invention Peer node is specifically described by taking server as an example, as shown in fig. 7, the flow includes:
Step 701:Pre-establish non-trusted node set.
When actually implementing, at least one non-trusted node is determined by existing Network Security Device;Utilize determination The identification information of all non-trusted nodes establishes non-trusted node set;The identification information of non-trusted node can be non-trusted section The domain name or IP address of point.
Step 702:The packet that the reception server is sent.
Step 703:Obtain the domain name and IP address of server.
Step 704:Whether the domain name or IP address for judging server belong to non-trusted node set, if it is, performing step Rapid 705;If not, perform step 709.
When actually implementing, all non-trusted nodes that can determine that are identified by existing network safety prevention means, Non-trusted node set is established using all identified non-trusted nodes.
Judge the domain name of server or whether IP address belongs to the method for non-trusted node set and can include:By server Domain name or IP address send to perform data safety protection equipment, the equipment is according to the domain name or IP address that receive and guarantor The non-trusted node set deposited is compared, and determines whether the domain name of server or IP address belong to non-trusted node set, and Generate configured information;Configured information is sent to terminal, terminal and determines whether that for server be non-trusted clothes according to configured information Business device.
Or terminal by the domain name of server or IP address compared with the non-trusted node set preserved in advance, really Determine whether server is non-trusted server.
Step 705:It is non-trusted server to determine server.
Step 706:Whether include request message in the packet for judging to receive;If it is, perform step 707;If It is no, perform step 708.
When actually implementing, the method for judging whether to include request message in packet can be:By detecting packet In whether include the identification information of request message, to determine whether include request message in packet.Here, due to existing logical Letter agreement has determined have the definition clearly arrived to the form for transmitting data, and different types of data correspond to different data formats, Therefore, the identification information of request message can be the data format of request message.
Step 707:Response message corresponding to request message is determined, it is pre- that the feedback data in response message is replaced with into first If data, the response message after being replaced;Response message after replacement is sent to server.
It is exemplary, the feedback data in response message is replaced with into mess code data, or by the feedback in response message Data replace with encryption data.
Here, encryption data can be:The data obtained after feedback data is encrypted using default AES.
Exemplary, can be by response message when the user privacy information of non-trusted server acquisition request terminal Privacy information be encrypted, the response after generation after correct privacy information is replaced is replaced with the privacy information after encryption and is disappeared Breath, then the response message after replacement is sent to non-trusted server.
It should be noted that when non-trusted node detects to the response message received, because encryption data does not have There is any detection successfully to steal terminal data according to being easier to believe non-trusted server, and stop the number to the terminal According to request.
Step 708:Packet discard simultaneously generates " confirming to receive " response;By " confirming to receive " response of generation Send to server.
In the embodiment of the present invention, " confirming to receive " response is used to indicate the packet that non-trusted server this time issues It has been be received normally that, avoid non-trusted server from persistently issuing packet.
Step 709:It is trusted node to determine server, and received data packet simultaneously performs corresponding processing operation.
In this step, normal data reception operation is performed when terminal determines that server is trusted node.
Method, terminal and the computer-readable recording medium of a kind of data protection provided in an embodiment of the present invention, reception pair The packet that end node is sent;It is non-trusted node to determine the peer node;When the packet includes request message, really Response message corresponding to the fixed packet, the request message are used for acquisition request feedback data;The packet is corresponding Response message in feedback data replace with the first preset data, the response message after being replaced;After the replacement Response message is sent to the peer node;When the packet does not include request message, the packet is abandoned, or will Data division in the packet replaces with the second preset data and is stored the packet after replacement;Response is generated to ring Should;The response is sent to the peer node, the response is used to indicate that the packet normally receives.
Using above-mentioned technical proposal, when it is determined that the peer node for sending packet is non-trusted node, by non-trusted section After the feedback data of point request replaces with the first preset data, sending to peer node;Or the number for sending peer node Directly abandon, and returned for indicating the response that normally receives according to bag, that is, avoid non-trusted node data steal with The threat data of non-trusted node is received, non-trusted node is it also avoid and continuously transmits packet.In this way, improve to non-trusted net The protective capacities stood, strengthen data protection dynamics.
Sixth embodiment
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of terminal.Fig. 8 is terminal in the embodiment of the present invention Composition structural representation, as shown in figure 8, the terminal 80 includes:Processor 801 and memory 802, wherein,
The processor 801 is used to perform the data protection program stored in memory, to realize following steps:Reception pair The packet that end node is sent;
It is non-trusted node to determine the peer node;
When the packet includes request message, response message corresponding to the packet, the request message are determined For acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first present count According to the response message after being replaced;Response message after the replacement is sent to the peer node;
When the packet does not include request message, the packet is abandoned, or by the data division in packet Replace with the second preset data and stored the packet after replacement;Generate response;And the response is sent out The peer node is delivered to, the response is used to indicate that the packet normally receives.
When actually implementing, the response message after the replacement is used to indicate that the peer node stops continuing described in transmission Packet.
First preset data is:Encryption data, mess code data, full 0 data or complete 1 data;The encryption data is: The data obtained after the feedback data is encrypted using default AES;Second preset data is:Mess code Data, full 0 data or complete 1 data.
When actually implementing, after the packet that the reception peer node is sent, the processor 801 is specifically used for Realize following steps:
The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set is included at least The identification information of one non-trusted node;
When the identification information of the peer node is an identification information in non-trusted node set, it is described right to determine End node is non-trusted node.
When actually implementing, the method for building up of non-trusted node set can include:By network security technology determine to A few non-trusted node;Non-trusted node set is established using the identification information of all non-trusted nodes of determination.
When actually implementing, the identification information of the non-trusted node is including at least one of following:IP address, domain name.
When actually implementing, terminal 80 can be the mobile terminal 100 shown in Fig. 1, and processor 801 can be mobile terminal Processor 110 in 100, memory 802 can be the memory 109 in mobile terminal 100.
In actual applications, above-mentioned processor 801 can be application-specific IC (ASIC, Application Specific Integrated Circuit), digital signal processing device (DSPD, Digital Signal Processing Device), programmable logic device (PLD, Programmable Logic Device), field programmable gate array At least one of (Field-Programmable Gate Array, FPGA), controller, microcontroller, microprocessor.Can To understand ground, for different equipment, for realizing that the electronic device of above-mentioned processor function can also be other, the present invention is real Example is applied to be not especially limited.
Above-mentioned memory 802 can be volatile memory (volatile memory), such as random access memory (RAM, Random-Access Memory);Or nonvolatile memory (non-volatile memory), such as read-only deposit Reservoir (ROM, Read-Only Memory), flash memory (flash memory), hard disk (HDD, Hard Disk Drive) Or solid state hard disc (SSD, Solid-State Drive);Or the combination of the memory of mentioned kind, and carried to processor 801 For instruction and data.
In addition, each functional module in the present embodiment can be integrated in a processing unit or each list Member be individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated unit both can be with Realized, can also be realized in the form of software function module in the form of hardware.
If the integrated unit realizes that being not intended as independent product is sold in the form of software function module Or in use, it can be stored in a computer read/write memory medium, based on such understanding, the technical side of the present embodiment The part or all or part of the technical scheme that case substantially contributes to prior art in other words can be produced with software The form of product is embodied, and the computer software product is stored in a storage medium, including some instructions are causing one Platform computer equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform sheet The all or part of step of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD Etc. it is various can be with the medium of store program codes.
7th embodiment
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, such as including The memory of computer program, above computer program can be foregoing one or more to complete by the computing device of terminal Method and step in individual embodiment.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

  1. A kind of 1. method of data protection, it is characterised in that methods described includes:
    Receive the packet that peer node is sent;
    It is non-trusted node to determine the peer node;
    When the packet includes request message, response message corresponding to the packet is determined, the request message is used for Acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first preset data, obtained Response message after to replacement;Response message after the replacement is sent to the peer node;
    When the packet does not include request message, the packet is abandoned, or by the data division in the packet Replace with the second preset data and stored the packet after the replacement;Generate response;By the response Send to the peer node, the response is used to indicate that the packet normally receives.
  2. 2. according to the method for claim 1, it is characterised in that the response message after the replacement is used to indicate the opposite end Node stops continuing to send the packet.
  3. 3. according to the method for claim 1, it is characterised in that first preset data is:Encryption data, mess code number According to, full 0 data or complete 1 data;The encryption data is:After the feedback data is encrypted using default AES Obtained data;
    Second preset data is:Mess code data, full 0 data or complete 1 data.
  4. 4. according to the method for claim 1, it is characterised in that after the packet that the reception peer node is sent, Methods described also includes:
    The identification information of non-trusted node set and the peer node is obtained, the non-trusted node set includes at least one The identification information of non-trusted node;
    When the identification information of the peer node is an identification information in non-trusted node set, determine described to end segment Point is non-trusted node.
  5. 5. according to the method for claim 4, it is characterised in that the identification information of the non-trusted node include it is following at least One:IP address, domain name.
  6. 6. a kind of terminal, it is characterised in that the terminal includes:Processor and memory;Wherein,
    The processor is used to perform the data protection program stored in memory, to realize following steps:Receive peer node The packet of transmission;
    It is non-trusted node to determine the peer node;
    When the packet includes request message, response message corresponding to the packet is determined, the request message is used for Acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first preset data, obtained Response message after to replacement;Response message after the replacement is sent to the peer node;
    When the packet does not include request message, the packet is abandoned, or by the data division in the packet Replace with the second preset data and stored the packet after the replacement;Generate response;By the response Send to the peer node, the response is used to indicate that the packet normally receives.
  7. 7. terminal according to claim 6, it is characterised in that the response message after the replacement is used to indicate the opposite end Node stops continuing to send the packet.
  8. 8. terminal according to claim 6, it is characterised in that after the packet that the reception peer node is sent, The processor is specifically used for realizing following steps:
    The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set includes at least one The identification information of non-trusted node;
    When the identification information of the peer node is an identification information in non-trusted node set, determine described to end segment Point is non-trusted node.
  9. 9. terminal according to claim 8, it is characterised in that the identification information of the non-trusted node include it is following at least One:IP address, domain name.
  10. 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program quilt The step of method described in any one of claim 1 to 5 is realized during computing device.
CN201711046626.6A 2017-10-31 2017-10-31 A kind of method of data protection, terminal and computer-readable recording medium Pending CN107835167A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711046626.6A CN107835167A (en) 2017-10-31 2017-10-31 A kind of method of data protection, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711046626.6A CN107835167A (en) 2017-10-31 2017-10-31 A kind of method of data protection, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107835167A true CN107835167A (en) 2018-03-23

Family

ID=61651056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711046626.6A Pending CN107835167A (en) 2017-10-31 2017-10-31 A kind of method of data protection, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107835167A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266582A (en) * 2019-05-29 2019-09-20 深圳市梦网科技发展有限公司 A kind of information push method, system, server and communication terminal
CN110661762A (en) * 2018-06-29 2020-01-07 中兴通讯股份有限公司 Cross information transmission method, device and computer storage medium
CN110662248A (en) * 2018-06-29 2020-01-07 成都鼎桥通信技术有限公司 Signal measurement method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790982A (en) * 2005-12-26 2006-06-21 北京航空航天大学 Method and system for realizing trust identification based on negotiation communication
CN102164033A (en) * 2010-02-24 2011-08-24 腾讯科技(深圳)有限公司 Method, device and system for preventing services from being attacked
CN104519043A (en) * 2013-09-30 2015-04-15 瞻博网络公司 Fuzzing server responses to malicious client devices
CN104618404A (en) * 2015-03-10 2015-05-13 网神信息技术(北京)股份有限公司 Processing method, device and system for preventing network attack to Web server
CN104899175A (en) * 2014-03-04 2015-09-09 深圳市中兴微电子技术有限公司 Safety access control method and device based on on-chip bus protocol
US20160224985A1 (en) * 2015-01-30 2016-08-04 Kounosoft Co., Ltd. System and method for card payment in which confirmation is available before transaction
CN106709280A (en) * 2016-12-08 2017-05-24 北京旷视科技有限公司 Method, client and server for processing information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790982A (en) * 2005-12-26 2006-06-21 北京航空航天大学 Method and system for realizing trust identification based on negotiation communication
CN102164033A (en) * 2010-02-24 2011-08-24 腾讯科技(深圳)有限公司 Method, device and system for preventing services from being attacked
CN104519043A (en) * 2013-09-30 2015-04-15 瞻博网络公司 Fuzzing server responses to malicious client devices
CN104899175A (en) * 2014-03-04 2015-09-09 深圳市中兴微电子技术有限公司 Safety access control method and device based on on-chip bus protocol
US20160224985A1 (en) * 2015-01-30 2016-08-04 Kounosoft Co., Ltd. System and method for card payment in which confirmation is available before transaction
CN104618404A (en) * 2015-03-10 2015-05-13 网神信息技术(北京)股份有限公司 Processing method, device and system for preventing network attack to Web server
CN106709280A (en) * 2016-12-08 2017-05-24 北京旷视科技有限公司 Method, client and server for processing information

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661762A (en) * 2018-06-29 2020-01-07 中兴通讯股份有限公司 Cross information transmission method, device and computer storage medium
CN110662248A (en) * 2018-06-29 2020-01-07 成都鼎桥通信技术有限公司 Signal measurement method and apparatus
CN110661762B (en) * 2018-06-29 2022-04-15 中兴通讯股份有限公司 Cross information transmission method, device and computer storage medium
CN110662248B (en) * 2018-06-29 2022-07-08 成都鼎桥通信技术有限公司 Signal measurement method and apparatus
CN110266582A (en) * 2019-05-29 2019-09-20 深圳市梦网科技发展有限公司 A kind of information push method, system, server and communication terminal
CN110266582B (en) * 2019-05-29 2022-08-26 深圳市梦网科技发展有限公司 Message pushing method, system, server and communication terminal

Similar Documents

Publication Publication Date Title
CN107562336A (en) A kind of method, equipment and computer-readable recording medium for controlling suspension ball
CN107729133A (en) A kind of method, terminal and computer-readable recording medium for running application program
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107295501A (en) Information updating method, terminal, server and computer-readable recording medium
CN107517321A (en) Terminal pattern switching method, mobile terminal and computer-readable recording medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN108075899A (en) A kind of auth method, mobile terminal and computer readable storage medium
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN107517208A (en) Apparatus control method, device and computer-readable recording medium
CN107181865A (en) Processing method, terminal and the computer-readable recording medium of unread short messages
CN107563158A (en) Show hiden application figure calibration method, equipment and computer-readable recording medium
CN107846675A (en) Register method, terminal, registrar and computer-readable recording medium
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN107621915A (en) A kind of message prompt method, equipment and computer-readable storage medium
CN107635232A (en) A kind of network share method, terminal and computer-readable recording medium
CN107317680A (en) Labeling method, system and the computer-readable recording medium of secured account numbers
CN107835167A (en) A kind of method of data protection, terminal and computer-readable recording medium
CN107622213A (en) A kind of data access method, terminal and computer-readable recording medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN107562343A (en) A kind of interactive regulation and control method, equipment and computer-readable recording medium
CN107423065A (en) Method, mobile terminal and the computer-readable recording medium that a kind of application is attended to anything else
CN107516051A (en) A kind of data encryption storage method, device and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180323